Media watermarking by biasing randomized statistics

a random statistic and media watermarking technology, applied in the field of media watermarking, can solve the problems of limited law value, lack of enforcement ability, and musician's unwillingness to publicly disclose their next song

Inactive Publication Date: 2009-05-26
MICROSOFT TECH LICENSING LLC
View PDF45 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]The present invention relates generally to media watermarking, and more particularly to systems and methods for utilizing biased, randomized statistics to create embedded media watermarks. Randomly generated areas with random attributes from two-dimensional media forms, such as, for example, those forms generated by Modulated Complex Lapped Transformation (MCLT), are leveraged to embed information relating to a media's ownership and / or distribution source. This provides a means to establish a media's source despite malicious and / or non-malicious attacks. By providing embedded user-unique identification, media can enable mark detection for identifying the source of copied media without the embedded information substantially interfering with the intended purpose of the media itself. In one instance of the present invention, media is transformed into a two-dimensional media form with randomly generated areas having a subset of overlapping areas. User-unique keys are then utilized to determine attributes or “entry values” for each of the randomly generated areas. This permits creation of statistically unique locations for each user key. The statistical qualities are biased and then utilized to determine a logarithmic magnitude watermark value to embed in the original media at that location. Detection of the watermark, in one instance of the present invention, is performed by utilizing a statistical correlation method and a predetermined threshold to determine a particular user.

Problems solved by technology

If this were allowed, the musician would not be as willing to publicly disclose his next song.
Typically, it is the enforcement process that often limits the value of a law.
The intent to enforce may be genuine, but the ability to enforce may be lacking due to limits in technology.
The earliest versions of digital watermarking were very distinctive and often interfered with utilizing the product.
However, despite the progression of digital watermarking technology, one of the drawbacks has been the lack of identifying sources from which parties illegally copy goods.
Often the watermark interferes with the use of a product.
It is also significant that watermarks cannot be removed and / or impersonated by unauthorized parties and that they contain enough inherent secrecy (i.e., security).

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Media watermarking by biasing randomized statistics
  • Media watermarking by biasing randomized statistics
  • Media watermarking by biasing randomized statistics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030]The present invention is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It may be evident, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the present invention.

[0031]As used in this application, the term “component” is intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. By way of illustration, both an appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

PropertyMeasurementUnit
frequenciesaaaaaaaaaa
frequencyaaaaaaaaaa
frequencyaaaaaaaaaa
Login to view more

Abstract

The present invention leverages randomly generated areas with random attributes from two-dimensional media forms to embed information relating to a media's ownership and / or distribution source. This provides a means to establish a media's source despite attacks. By providing embedded user-unique identification, media can enable detection for identifying the source of copied media without the embedded information substantially interfering with the intended purpose of the media itself. In one instance of the present invention, media is transformed into a two-dimensional media form with randomly generated areas having a subset of overlapping areas. User-unique keys are then utilized to determine attributes for each of the areas. This permits creation of statistically unique locations for each user key. The statistical qualities are biased and utilized to determine a logarithmic magnitude watermark value to embed in the media at that location. Detection is performed by utilizing a statistical correlation method to determine a user.

Description

TECHNICAL FIELD[0001]The present invention relates generally to media watermarking, and more particularly to systems and methods for utilizing biased, randomized statistics to create embedded media watermarks.BACKGROUND OF THE INVENTION[0002]In order to encourage the sharing of ideas and creativity, countries often provide laws to protect ideas and expressions. Thus, a musician who composes a song has rights in his work to facilitate him in exploiting the work. Without these rights, anyone could claim his efforts and sell them as their own. If this were allowed, the musician would not be as willing to publicly disclose his next song. This, in effect, would deprive the public, in general, of valuable artistic works. The laws that govern the protection of such works generally have been around for many years. However, even if protective laws do exist, they must also be enforced in order for them to be effective. Typically, it is the enforcement process that often limits the value of a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/00G10L19/00G11B20/00
CPCG10L19/018G11B20/00086G11B20/00173G11B20/00891
Inventor KESAL, MUSTAFAMIHCAK, MEHMET KIVANCVENKATESAN, RAMARATHNAM
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products